Bubble: a new tool for phishing scams
Cybercriminals are now deploying web applications generated by Bubble, an AI-powered app builder, to hunt for corporate credentials.
1399 articles
Cybercriminals are now deploying web applications generated by Bubble, an AI-powered app builder, to hunt for corporate credentials.
In November 2025, the npm ecosystem was hit by a flood of junk packages that were part of the IndonesianFoods malicious campaign. We’re breaking down the lessons learned from this incident.
Threat actors are promoting pages containing malicious instructions for installing AI agents intended for workflow automation.
Educational institutions are increasingly falling victim to ransomware attacks. We look at some real-world incidents, explain their causes, and discuss how to mitigate risks to academic infrastructure.
The latest update to Kaspersky Cloud Workload Security adds support for an AI assistant for image analysis.
An in-depth analysis of CVE-2026-3102, a vulnerability posing a potential threat to anyone processing images on a Mac.
What is the purpose of a local version of the Kaspersky Threat Attribution Engine, and how to hook it up to IDA Pro?
What corporate security teams should do about the “viral” AI agent.
Breaking down core cybersecurity terms that colleagues often interpret differently or incorrectly.
Kaspersky SIEM got a set of correlation rules for detecting attempts to exploit vulnerabilities for authentication bypass in Fortinet products.
Why is it useful to attribute malware to a specific hacker group?
Detecting attacks related to compromised accounts with AI and other updates in Kaspersky SIEM.
The top-10 risks of deploying autonomous AI agents, and our mitigation recommendations.
What is the year 2038 problem — also known as “Unix Y2K” — and how to prepare corporate IT systems for it?
Crooks are impersonating your brand to attack customers, partners, and employees. How do you spot — and stop — an attack of the clones?
Who can you trust in the cybersecurity solutions market? Fourteen major vendors were compared in terms of transparency, security management, and data-handling practices – and guess which was a leader across the board?!…
Cybercriminals are distributing malware that deploys an infostealer and masks its activity in network and system logs.
GReAT experts have analyzed a new targeted campaign by the ForumTroll APT group.
How to eliminate the threat posed to organizations by ownerless servers and services, outdated libraries, and insecure APIs.